Professional Documents
Culture Documents
https://payonwork.com/wp-login.php?redirect_to=https%3A%2F%2Fpayonwork.com%2Fwp-admin
%2F&reauth=1
https://www.ensuretech.com/wp-login.php
https://pashto.app.com.pk/pashto/wp-login.php?redirect_to=https%3A%2F%2Fpashto.app.com.pk
%2Fpashto%2Fwp-admin%2F&reauth=1
https://vulmon.com/exploitdetails?
qidtp=packetstorm_exploits&qid=0b89a8f9aa88bf8e0fe15aafb9765d40
exploit of contarct 7 on
view-source:https://www.plddb.pk/
Tried on
payonwork
www.plddb.pk (above)
https://pashto.app.com.pk/
https://qsc.com.pk/
1) https://pcsi.gov.pk/ has an outdated plugin MetaSlider but for it we need admin credentials
(tried sql payloads too) https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-
af6bce6bb4ef
Considered
Found no specific exploit and had to do research on AJAX so I left.
Also tried
https://www.exploit-db.com/exploits/50882